In this video, Jason and John discuss the intricacies and challenges of job hunting in the cybersecurity field, especially during the COVID-19 pandemic. The presentation offers practical advice on improving job search strategies, enhancing resumes, and effectively using LinkedIn to connect with potential employers.
In this video, the speakers discuss the card game ‘Backdoors and Breaches’ which involves incident response and cybersecurity tactics. They explain the rules, procedures, and strategies for playing the game, using it as a tool for security training and awareness.
In this video, John and Alyssa discuss advanced memory analysis techniques. They delve into the use of tools like Volatility and Rekall for dissecting memory dumps, and demonstrate how to extract critical data from a Windows operating system.
In this video, seasoned experts discuss effective strategies for starting and advancing a career in computer security. They emphasize the importance of understanding core principles over chasing buzzwords like ‘blockchain’ and ‘AI’ initially.
In this video, the speakers discuss hardware hacking, focusing on techniques for identifying and exploiting vulnerabilities in various devices such as routers and access points. They demonstrate practical methods using tools like the Jtagulator and bus pirate to interface with device firmware, illustrating the potential to extract sensitive information or manipulate device functionalities.
Join us Next Wednesday for our first ever Incident Response CTF Competition hosted by our friends at @metactf ! For more information on our FREE CTF Competition or our FREE Incident Response Summit, you visit us here: https://www.antisyphontraining.com/event/incident-response-summit/
In this video, John Strand discusses the practical applications and features of Wireshark for network analysis. He demonstrates how to use Wireshark to capture and analyze packets, emphasizing its advantages over tcpdump.
In this video, Beau Bullock from Black Hills Information Security discusses penetration testing in Azure cloud environments. He provides insights into the methodology of attacking cloud environments, focusing on Azure but also touching on AWS and GCP.